CompTIA SY0-701 Practice Test - Questions Answers, Page 35
List of questions
Related questions
The security team at a large global company needs to reduce the cost of storing data used for performing investigations. Which of the following types of data should have its retention length reduced?
Packet capture
Endpoint logs
OS security logs
Vulnerability scan
Which of the following is the primary purpose of a service that tracks log-ins and time spent using the service?
Availability
Accounting
Authentication
Authorization
Which of the following should be used to aggregate log data in order to create alerts and detect anomalous activity?
SIEM
WAF
Network taps
IDS
Which of the following is a type of vulnerability that refers to the unauthorized installation of applications on a device through means other than the official application store?
Cross-site scripting
Buffer overflow
Jailbreaking
Side loading
Which of the following types of identification methods can be performed on a deployed application during runtime?
Dynamic analysis
Code review
Package monitoring
Bug bounty
Which of the following is the best way to provide secure remote access for employees while minimizing the exposure of a company's internal network?
VPN
LDAP
FTP
RADIUS
An administrator must replace an expired SSL certificate. Which of the following does the administrator need to create the new SSL certificate?
CSR
OCSP
Key
CRL
Which of the following strategies should an organization use to efficiently manage and analyze multiple types of logs?
Deploy a SIEM solution
Create custom scripts to aggregate and analyze logs
Implement EDR technology
Install a unified threat management appliance
A customer has a contract with a CSP and wants to identify which controls should be implemented in the IaaS enclave. Which of the following is most likely to contain this information?
Statement of work
Responsibility matrix
Service-level agreement
Master service agreement
Which of the following is a type of vulnerability that involves inserting scripts into web-based applications in order to take control of the client's web browser?
SQL injection
Cross-site scripting
Zero-day exploit
On-path attack
Question